Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1922

Опубликовано: 13 мая 2013
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 3.3

Описание

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

РелизСтатусПримечание
devel

not-affected

1.5.0+dfsg-3ubuntu2
esm-infra-legacy/trusty

not-affected

1.5.0+dfsg-3ubuntu2
esm-infra/xenial

not-affected

1.5.0+dfsg-3ubuntu2
hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

ignored

end of life
saucy

not-affected

1.5.0+dfsg-3ubuntu2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

ignored

end of life
precise

ignored

quantal

ignored

end of life
raring

DNE

saucy

DNE

trusty

DNE

Показывать по

EPSS

Процентиль: 23%
0.00079
Низкий

3.3 Low

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

nvd
больше 12 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

debian
больше 12 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw ...

github
больше 3 лет назад

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.

EPSS

Процентиль: 23%
0.00079
Низкий

3.3 Low

CVSS2